Covert Channels-based Stealth Attacks in Industry 4.0

dc.centroE.T.S.I. Informáticaes_ES
dc.contributor.authorAlcaraz-Tello, María Cristina
dc.contributor.authorBernieri, Giuseppe
dc.contributor.authorPascucci, Federica
dc.contributor.authorLopez, Javier
dc.contributor.authorSetola, Roberto
dc.date.accessioned2025-01-15T10:35:42Z
dc.date.available2025-01-15T10:35:42Z
dc.date.issued2019-05-15
dc.departamentoInstituto de Tecnología e Ingeniería del Software de la Universidad de Málaga
dc.description.abstractIndustry 4.0 advent opens several cyber-threats scenarios originally designed for classic information technology, drawing the attention to serious risks for the modern industrial control networks. To cope with this problem, in this paper we address the security issues related to covert channels applied to industrial networks, identifying the new vulnerability points when information technologies converge with operational technologies such as edge computing infrastructures. Specifically, we define two signaling strategies where we exploit the ModbusTCP protocol as target to set up a covert channel. Once the threat channel is established, passive and active offensive methodologies are further exploited by implementing and testing them on a real Industrial Internet of Things testbed. The experimental results highlight the potential damage of such specific threats and the easy extrapolation of the attacks to other types of channels in order to show the new risks for the Industry 4.0. Related to this, we discuss some countermeasures offering an overview of possible mitigation and defensive measures.es_ES
dc.identifier.citationC. Alcaraz, G. Bernieri, F. Pascucci, J. Lopez and R. Setola, "Covert Channels-Based Stealth Attacks in Industry 4.0," in IEEE Systems Journal, vol. 13, no. 4, pp. 3980-3988, Dec. 2019, doi: 10.1109/JSYST.2019.2912308es_ES
dc.identifier.doi10.1109/JSYST.2019.2912308
dc.identifier.urihttps://hdl.handle.net/10630/36355
dc.language.isoenges_ES
dc.publisherIEEE Xplorees_ES
dc.rights.accessRightsopen accesses_ES
dc.subjectSeguridad informáticaes_ES
dc.subject.otherStealth attackses_ES
dc.subject.otherCovert channeles_ES
dc.subject.otherIndustry 4.0es_ES
dc.subject.otherData exfiltrationes_ES
dc.subject.otherCommand and controles_ES
dc.titleCovert Channels-based Stealth Attacks in Industry 4.0es_ES
dc.typejournal articlees_ES
dc.type.hasVersionAMes_ES
dspace.entity.typePublication
relation.isAuthorOfPublication7e0ebfca-cab9-4146-9e5b-d06a1ce3d7eb
relation.isAuthorOfPublication.latestForDiscovery7e0ebfca-cab9-4146-9e5b-d06a1ce3d7eb

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Covert Channels based Stealth Attacks in I40.pdf
Size:
998.15 KB
Format:
Adobe Portable Document Format
Description:

Collections